
Summary
This rule is designed to detect malware activity utilizing Elastic Endgame’s capabilities. It specifically focuses on file classification events which are marked with a high-risk score (99), indicating a critical level of concern. The rule queries Elastic's event data to identify alerts generated by the Endgame module that correspond to malware detection. It is set up to allow for generating a higher number of alerts than the default threshold, ensuring that potentially significant incidents are captured comprehensively. To use this rule effectively, analysts are instructed to follow a series of investigation steps, including reviewing alert details in the Elastic Endgame console, examining recent activity logs on the endpoint, and consulting threat intelligence sources for matching signatures to better understand the context of the alert. The setup provides guidance on ensuring the Kibana alerting configuration allows for the maximum alerts specified in the rule while also addressing potential false positives effectively. Recommended response actions include isolating the affected system, terminating suspicious processes, and engaging with incident response teams to manage and remediate the situation.
Categories
- Endpoint
- Cloud
- Infrastructure
Data Sources
- Sensor Health
- Logon Session
- Network Traffic
Created: 2020-02-18